Distributed intrusion detection system and connecting method of centralized management in same

A technology of an intrusion detection system and a connection method, which is applied in the field of centralized management of connections and distributed intrusion detection systems, can solve problems such as increasing the workload of administrators, and achieve the effects of reducing workload, improving security, and reducing complexity.

Inactive Publication Date: 2011-08-10
BEIJING VENUS INFORMATION TECH +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a distributed intrusion detection system, a management control center may need to manage a large number of detection engines, and these engines m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed intrusion detection system and connecting method of centralized management in same
  • Distributed intrusion detection system and connecting method of centralized management in same
  • Distributed intrusion detection system and connecting method of centralized management in same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention.

[0034] It should be noted that, if there is no conflict, the embodiments of the present invention and various features in the embodiments can be combined with each other, and all are within the protection scope of the present invention. In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0035] The core idea of ​​the technical solution of the present invention is that the monitoring service is est...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed intrusion detection system and a connecting method of centralized management in the same, improving the security of a detection engine in the distributed intrusion detection system. The method mainly comprises the following steps of: starting a monitoring opening by a management control center; detecting the management control center by the detection engine; sending an identity authentication request to the management control center by the detection engine for identity authentication; and establishing communication connection between the detection engine and the management control center after the management control center is authenticated. Compared with the prior art, the technical scheme provided by the invention greatly lowers the communication management complexity of the distributed intrusion detection system, improves the security of the detection engine and reduces the workload of a system administrator.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a distributed intrusion detection system and a connection method for centralized management in the system. Background technique [0002] In a distributed intrusion detection system, the detection engines are distributed on different nodes of the network, and the centralized management of these engines is the key guarantee for the effective operation of the entire system. Therefore, each detection engine needs to communicate effectively with the management control center (CC), receive various management configuration commands from the management control center, and report alarm logs to the management control center. [0003] Currently, the distributed intrusion detection systems commonly used in the market generally use the management control center to actively connect to the detection engine, while the detection engine can only accept the connection passively. In this communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L12/26
Inventor 张峰邓炜赵东宾叶润国
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products